CFP last date
20 March 2024
International Journal of Computer Applications
A Publication of Foundation of Computer Science
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Call for Paper
April Edition
IJCA solicits high quality original research papers for the upcoming April edition of the journal. The last date of research paper submission is 20 March 2024
Submit your paper
Know more
The week's pick
Recurrent Neural Network for Stock Market Forecasting using Long Short-Term Memory and an Analysis of How Social Media Affects Share Prices
SR Samarasuriya
DVDS Abeysinghe
KGK Abeywardhane
Random Articles
Control Architecture Scalable Dedicated to Braille Panels for Displaying Information on Public Places
January
2015
Energizing Entrepreneurial Spirit Among Ghanaian Workforce
February
2016
Synthesis of a Linear Antenna Array for Maximum Side-lobe Level Reduction
January
2014
Multilevel Image based Data Security using Combined Approach of Lsb_Dct Watermarking
October
2013
Archives
Volume 186
Random article
Semi-supervised Learning for Image Quality Assessment Problem
Volume 185
Random article
Predictive Framework for Advanced Customer Churn Prediction using Machine Learning
Volume 184
Random article
Offline Signature Verification based on Geometric Features using Filter Method
Volume 183
Random article
A Fuzzy Logic Adaptive Image Resize (Resolution) Level using Cross-Layering in Wireless Multimedia Sensor Networks
Volume 182
Random article
A Hybrid Approach for Helmet Detection for Riders Safety using Image Processing, Machine Learning, Artificial Intelligence
Volume 181
Random article
Influence of Building Heights and Nature of Rooftop Views on Propagation Loss Prediction for Tropical Environment in Ondo State, Nigeria
Volume 180
Random article
Using two Educational Simulator Tools for Computer Architecture Teaching and Learning Support
Volume 179
Random article
Efficient Adaptive Hold Logic Aging-Aware Reliable Multiplier Design using Verilog HDL
Volume 178
Random article
Technical and Economic Analysis of Scrubbers
Volume 177
Random article
Application of Soft-Set Relations and Soft Matrices in Medical Diagnosis using Sanchez’s Approach
Volume 176
Random article
Development of an Interactive Hausa Language Learning System
Volume 175
Random article
Minimal Similarity Loss Hashing based on Optimized Self-taught Clustering Method
Volume 174
Random article
Development of Core-based Minutiae Triplets Model for an Improved Fingerprint Matching
Volume 173
Random article
Incremental Temporal Mining using Incremental TPMiner and Incremental P-TPMiner Algorithms
Volume 172
Random article
A Radial Point Interpolation Method for Pricing Options on a Dividend Paying Asset
Volume 171
Random article
An Overview of Text Summarization
Volume 170
Random article
An Anchor based Data Collection Algorithm for Improving LifeTime Ratio of WSN
Volume 169
Random article
A Novel Approach to Database Intrusion Detection
Volume 168
Random article
The Role of Community Characteristics in determining Target Audiences in Arabic Gulf Countries interested in Online Purchasing through Commercial Smartphone Applications
Volume 167
Random article
Combating Malware with Whitelisting in IoT-based Medical Devices
Volume 166
Random article
Improving Round Robin Process Scheduling Algorithm
Volume 165
Random article
Enhancing Quality of Images using Fuzzy Logic and Singleton Parameters
Volume 164
Random article
Automation the Process of Unifying the Change in the Firewall Performance
Volume 163
Random article
A Low Cost Computer based Fingerprint Security System for Restricted Access Control Automation using LabVIEW
Volume 162
Random article
Survey on Classification, Detection and Prevention of Network Attacks using Rule based Approach
Volume 161
Random article
An Arithmetic Technique for Non-Abelian Group Cryptosystem
Volume 160
Random article
The Comprehensive Performance Evaluation of AODV and OSPF in WiMAX
Volume 159
Random article
SuggestABook: A Book Recommender Engine with Personality based Mapping
Volume 158
Random article
Generalized Multiplicative Coupled Fibonacci Sequence and its Properties
Volume 157
Random article
Iparker: A Smart Car Parking System for Smart City
Volume 156
Random article
An Improved Approach for Twitter Data Analysis using Clustering and J48 Classification
Volume 155
Random article
Comparative Study of Cuckoo Inspired Metaheuristics Applying to Knapsack Problems
Volume 154
Random article
IoT: Networking Technologies and Research Challenges
Volume 153
Random article
Performance Comparison for Mining Large Data from the Internet and Learning using ID3 Algorithm in a Docker versus Virtual Machine Environment
Volume 152
Random article
Sensing and Supervising through IOT
Volume 151
Random article
Developing an Intelligent Decision Support System for the Diagnosis of Some Children's Diseases
Volume 150
Random article
A Survey over the Security Issues of Bluetooth using Elliptic Curve Cryptography
Volume 149
Random article
A Novel circuit of SRAM Cell Against Single-Event Multiple Effects for 45nm Technology
Volume 148
Random article
Outage Probability Analysis of Multihop-Multicast Cooperative System
Volume 147
Random article
Tropical Cryptography and Two Variants of Implementation of the Original Matrix One-Way Function
Volume 146
Random article
Tigrinya Part-of-Speech Tagging with Morphological Patterns and the New Nagaoka Tigrinya Corpus
Volume 145
Random article
Case based Reasoning for Treatment and Management of Diabetes
Volume 144
Random article
Systematic Scheduling of Jobs in Cloud Computing Environment for Efficient Utilization of Available Resources
Volume 143
Random article
Forensics Analysis from Cloud Storage Client Application on Proprietary Operating System
Volume 142
Random article
Low Power Dropout Regulators with Efficiently Controlled Transient Response
Volume 141
Random article
Issues and Limitations of HMM in Speech Processing: A Survey
Volume 140
Random article
ABS Dynamic Simulation Test Stand using Lab View
Volume 139
Random article
Design and Performance Analysis of Reversible RSG Gate using QCA
Volume 138
Random article
Performance Analysis of Zigbee Mesh Topology by Varying Trajectory
Volume 137
Random article
Survey Paper on Digital Image Sharing by Diverse Image Media
Volume 136
Random article
A Parallel Early Binding Recursive Ant Colony Optimization (PEB-RAC) Approach for Generating Optimized Auto Test Cases from programming Inputs
Volume 135
Random article
Improving Arabic Text Categorization using Normalization and Stemming Techniques
Volume 134
Random article
Amalgamation of Automated Test Case Generation Techniques with Data Mining Techniques: A Survey
Volume 133
Random article
Based on GSM Wireless Fire Alarm System
Volume 132
Random article
Removal of Malicious Attacks using Hybrid Symmetric Cryptograhic Technique
Volume 131
Random article
Data Mining Technology and its Applications to Power Systems
Volume 130
Random article
Fuzzy Tier-based User Experience Prediction Scheme
Volume 129
Random article
Impact of Usage of Social Networking Sites on Youth
Volume 128
Random article
Personalized Recommendation System for Medical Assistance using Hybrid Filtering
Volume 127
Random article
DDOS Attack Prevention on Application Layer
Volume 126
Random article
Conceptual Model for E-Banking System using Indigenous Biometric Technique
Volume 125
Random article
Server Load – Balancing using Resources of Clustering Technique
Volume 124
Random article
Colour Image Encryption - A Wavelet Transformation Associated with Artificial Neural Network Approach
Volume 123
Random article
An Improved the Optimal Distributed Dummy Signature for Malicious Software in Mobile Network
Volume 122
Random article
Review of Human Motion Detection based on Background Subtraction Techniques
Volume 121
Random article
Bridging Decision Tree Data Mining Model to the Automated Knowledge Base for Rice Plant Agriculture Expert System
Volume 120
Random article
Algorithms of All Pair Shortest Path Problem
Volume 119
Random article
A Concept of A-KNN Clustering in Software Engineering
Volume 118
Random article
Stock Control using Data Mining
Volume 117
Random article
A Hybrid Approach of Image Fusion using Modified DTCWT with High Boost Filter Technique
Volume 116
Random article
Role of Test Case Prioritization based on Regression Testing using Clustering
Volume 115
Random article
Design of Vending Machine using Finite State Machine and Visual Automata Simulator
Volume 114
Random article
Open Source Software vs Proprietary Software
Volume 113
Random article
Effect of using Mobile Sink on Chain-based Routing Protocols in Wireless Sensor Networks
Volume 112
Random article
Foot Steps based Energy System for Street Lights
Volume 111
Random article
Graphical Approach to Index and Retrieve Standard Young Tableaux
Volume 110
Random article
An Approach for Designing and Implementing Eager and lazy Data Replication
Volume 109
Random article
Secure System Framework for Secure Visual Cryptography
Volume 108
Random article
K-Means Clustering Algorithm based on Entity Resolution
Volume 107
Random article
Review of Machine Transliteration Techniques
Volume 106
Random article
Extended Myopic Sensing Policy for Multiple SUs for Multichannel Opportunistic Access
Volume 105
Random article
Data Hiding in Image using multilevel 2-D DWT and ASCII Conversion and Cyclic Mathematical Function based Cryptography
Volume 104
Random article
Distinction of Discrete Transformations Applied to Hadoop's MapReduce
Volume 103
Random article
Survey on Data Security for Mobile Devices
Volume 102
Random article
Handoff Study of Ring Shaped Cellular Configuration Designed for High Altitude Platform Communications
Volume 101
Random article
Complex Dynamics of Jungck Ishikawa Iterates for Hyperbolic Cosine Function
Volume 100
Random article
State Merging in LR Parser under Count based Reduction
Volume 99
Random article
Simulink Implementation for Improvement of Vehicle Directional Control using Relay Experiment Method
Volume 98
Random article
Analytical Adjustment of Image Contrast
Volume 97
Random article
Maximizing Lifetime of Heterogeneous Wireless Sensor Network using Heed Protocol
Volume 96
Random article
Mitigating DDoS using Threshold-based Filtering in Collaboration with Capability Mechanisms
Volume 95
Random article
A Survey on Semantic Web based E-learning
Volume 94
Random article
Optimization of PID Controller Parameters based on Genetic Algorithm for non-linear Electromechanical Actuator
Volume 93
Random article
Performance Evaluation of Various Window Techniques for Noise Cancellation from ECG Signal
Volume 92
Random article
Optimal selection of Wind Turbine Generators
Volume 91
Random article
Non Coherent Block Coded Modulation using Linear Components Codes
Volume 90
Random article
Achieving Better Compression Applying Index-based Byte-Pair Transformation before Arithmetic Coding
Volume 89
Random article
Performance Evalutaion of Land Mobile Satellite System over Lutz Fading Channel for BPSK Modulation Scheme
Volume 88
Random article
A Geo-Location based Mobile Service that Dynamically Locates and Notifies the nearest Blood Donors for Blood Donation during Medical Emergencies
Volume 87
Random article
Implementation of Embedded Agile Methodology
Previous
Next